13 887
editací
(Založena nová stránka s textem „''"Every end instrument connected to UP computer network must be secured in appropriate manner, by suitable system configuration, by application of securit…“) |
Bez shrnutí editace |
||
Řádek 8: | Řádek 8: | ||
Each insufficiently secured computer represents a risk not only for its users, but also for other users of the network. If your computer is infected by computer viruses or worms, it can also become an easy target for computer hackers who might use your device to attack other systems in the network. Therefore, the computer security is a mandatory requirement for every UP network user. This is based in Rector's directiveː | Each insufficiently secured computer represents a risk not only for its users, but also for other users of the network. If your computer is infected by computer viruses or worms, it can also become an easy target for computer hackers who might use your device to attack other systems in the network. Therefore, the computer security is a mandatory requirement for every UP network user. This is based in Rector's directiveː | ||
''"Every end instrument connected to UP computer network must be secured in appropriate manner, by suitable system configuration, by application of security patches, etc. Should there be an infected, insufficiently secured end instrument, computer network administrator can suspend the right | ''"Every end instrument connected to UP computer network must be secured in appropriate manner, by suitable system configuration, by application of security patches, etc. Should there be an infected, insufficiently secured end instrument, computer network administrator can suspend the right to access to the UP computer network."'' | ||
[http://www.upol.cz/fileadmin/user_upload/dokumenty/2011/SRB3-11-14.pdf Směrnice rektora UP B3-15/7-SR,] Article 7, paragraph. 3 | [http://www.upol.cz/fileadmin/user_upload/dokumenty/2011/SRB3-11-14.pdf Směrnice rektora UP B3-15/7-SR,] Article 7, paragraph. 3 | ||